Skip to main content

A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems

Deliverables

Applicability of the Ethics guidelines for trustworthy AI to the COLLABS approach.

Applicability of the Ethics guidelines for trustworthy AI to the COLLABS approach.

Dissemination strategy and activities y1 m12

Dissemination strategy and activities y1 m12

System Architecture definition

System Architecture definition

Project handbook - initial version

Project handbook - initial version

Project handbook y2

Project handbook y2

The COLLABS Level-2 Security Package for Resilience in Smart Factories: 1st complete version

The COLLABS Level-2 Security Package for Resilience in Smart Factories: 1st complete version

The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

The COLLABS Level-1 Security Package for Securely Connected Objects: MVP

The COLLABS Level-1 Security Package for Securely Connected Objects: MVP

The COLLABS Level-2 Security Package for Resilience in Smart Factories: MVP

The COLLABS Level-2 Security Package for Resilience in Smart Factories: MVP

The COLLABS Level-3 Security Package for Secure Digital Supply Networks: MVP

The COLLABS Level-3 Security Package for Secure Digital Supply Networks: MVP

Searching for OpenAIRE data...

Publications

The Million Dollar Handshake Secure and Attested Communications in the Cloud

Author(s): Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Conference: IEEE CLOUD 2020, 2020

An enclave assisted snapshot-based kernel integrity monitor

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24
DOI: 10.1145/3378679.3394539

Peek-a-boo - i see your smart home activities, even encrypted!

Author(s): Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac
Published in: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, Page(s) 207-218
DOI: 10.1145/3395351.3399421

On Architectural Support for Instruction Set Randomization

Author(s): George Christou, Giorgos Vasiliadis, Vassilis Papaefstathiou, Antonis Papadogiannakis, Sotiris Ioannidis
Published in: ACM Transactions on Architecture and Code Optimization, Issue 17/4, 2020, Page(s) 1-26, ISSN 1544-3566
DOI: 10.1145/3419841